Good work. This sort of monitoring will help keep legacy third-party products protected and also create additional safeguards around those reaching end-of-life.

You may want to consider adding this capability to ensure that third-party components stay up-to-date and protected; this is especially important for older legacy products that may be reaching or have reached end-of-life.

Nice. It seems you have a good understanding and awareness of your hardware and the benefits of its secure boot functionality.

You may want to get a deeper familiarity of your hardware and check to see whether secure boot mechanisms are available to ensure that the critical hardware root of trust is established in your system.

Good work. You understand that partitioning can help in the separation of function. Structuring an application as a generic mass of software doesn’t typically provide much benefit and is something to avoid.

Structuring an application as a generic mass of software doesn’t typically provide much benefit and is something to avoid. Partitioning can help in the separation of function and in protecting the impacts of a system being hacked.

Your System’s Security Profile

Thanks for taking our survey. Here’s a high-level snapshot of how you fared.

Red in the chart (for No answers) may indicate a need to further investigate security efforts. Green in the chart (for Yes answers) indicates the achievement of some foundational security efforts. We hope you keep this important work going.

If you’d like to focus additional attention on security, we’d be happy to talk more about your current security approaches and solutions. Wind River® has a comprehensive portfolio of security services. In the meantime, the documents below can help explain some of our key solutions. Let’s talk.